Blar i SINTEF Digital på dokumenttype "Chapter"
Viser treff 1-20 av 414
-
3D stacked MEMS and ICs in a miniaturized sensor node
(Chapter, 2009)3D integration of micro electromechanical systems (MEMS) is expected to reduce the foot print of existing MEMS products and enable production of miniaturized sensor nodes on a large scale. However, 3D integration of MEMS ... -
3D-Printing Technology in Construction: Results from a Survey
(Emerald Reach Proceedings Series, Chapter; Conference object; Peer reviewed, 2019)Purpose – The purpose of this paper is to study the introduction of 3D-printing of concrete in the construction sector. Design/Methodology/Approach – A survey was conducted to collect professional view on ongoing innovations ... -
A Clover shaped silicon piezoresistive microphone for miniaturized photoacoustic gas sensors
(Chapter, 2009)Here we present the design and modeling of a novel piezoresistive microphone designed for a photoacoustic gas sensor system. The microphone is fabricated using a novel process to enable DRIE etch through of membranes of ... -
A COMPUTATIONAL FRAMEWORK INVOLVING CFD AND DATA MINING TOOLS FOR ANALYZING DISEASE IN CAROTID ARTERY BIFURCATION
(Chapter, 2017)Cardiovascular diseases, like Carotid Artery Disease and Coronary Artery Disease (CAD) are associated with the narrowing of artery due to build-up of fatty substances and cholesterol deposits (called plaque). Carotid Artery ... -
A Cryptographic Protocol for Communication in a Redundant Array of Independent Net-storages
(Chapter, 2011)This paper describes a cryptographic protocol for storing and processing data in a Cloud Computing setting, where users need not place absolute trust in the various Cloud Processing providers. This is achieved by distributing ... -
A Farewell to Trust: An Approach to Confidentiality Control in the Cloud
(Chapter, 2011)This paper applies a divide-and-conquer approach to achieve confidentiality control in Cloud Computing. We sketch how a Redundant Array of Independent Net-storages (RAIN) for Cloud Computing can be designed using techniques ... -
A Feasibility Study of a Method for Identification and Modelling of Cybersecurity Risks in the Context of Smart Power Grid
(COMPLEXIS 2019 - Proceedings of the 4th International Conference on Complexity, Future Information Systems and Risk;2019, Chapter; Peer reviewed, 2019)Power grids are undergoing a digital transformation are therefore becoming increasingly complex. As a result of this they are also becoming vulnerable in new ways. With this development come also numerous risks. Cybersecurity ... -
A flexible and highly configurable 3D vision system targeted for in-line product inspection is presented. The system includes a low cost 3D camera based on structured light and a set of flexible software tools that automate the measurement process. The specification of the measurement tasks is done in a first manual step. The user selects regions of the point cloud to analyze and specifies primitives to be characterized within these regions. After all the measurement tasks have been specified, m
(Chapter, 2008)A flexible and highly configurable 3D vision system targeted for in-line product inspection is presented. The system includes a low cost 3D camera based on structured light and a set of flexible software tools that automate ... -
A Framework for OpenGL Client-Server Rendering
(Chapter, 2012)We present a software framework that facilitates the development of OpenGL applications utilizing the limited GPU capacities of a portable client in combination with the high-end rendering hardware on a server. The resulting ... -
A Framework to Navigate the Privacy Trade-offs for Human-Centred Manufacturing
(Chapter, 2018)New technological advances can offer personalised and timely services for industry workers. Exoskeletons, HoloLens, Process Mining and Social Knowledge Networks are some of these services offered to workers by the EU HuMan ... -
A Lightweight Approach to Secure Software Engineering
(Chapter, 2011)Secure software engineering is much more than developing critical software. History has shown us that software bugs and design flaws also represent exploitable security vulnerabilities in seemingly innocuous applications ... -
A lightweight protocol suite for underwater communication
(Chapter, 2009)A lightweight MAC and network layer protocol suite for underwater acoustic communication has been developed. The protocol suite covers the MAC layer, hop-by-hop acknowledgement, multi-hop routing and transmission and ... -
A Metamodel for Specifying Quality Models in Model-Driven Engineering
(Chapter, 2008)In the context of model-driven engineering, models act as the primary artifacts and are eventually transformed into other artifacts, such as code and documentation. Consequently, to evaluate and assure the quality of ... -
A Method for Developing Algorithms for Assessing Cyber-Risk Cost
(Chapter, 2017)We present a method for developing executable algorithms for quantitative cyber-risk assessment. Exploiting techniques from security risk modeling and actuarial approaches, the method pragmatically combines use of available ... -
A Model-Based Approach to Support Safety-Related Decisions in the Petroleum Domain
(Chapter, 2016)Accidents on petroleum installations can have huge consequences; to mitigate the risk, a number of safety barriers are devised. Faults and unexpected events may cause barriers to temporarily deviate from their nominal ... -
A Model-Driven Approach to Interoperability in B2B Data Exchange
(Chapter, 2011)With the B2B data exchange becoming ubiquitous nowadays, automating as much as possible the exchange of data between collaborative enterprise systems is a key requirement for ensuring agile interoperability and scalability ... -
A Motion based Real-time Foveation Control Loop for Rapid and Relevant 3D Laser Scanning
(Chapter, 2011)We present an implementation of a novel foveating 3D sensor concept, inspired by the human eye, which intends to allow future robots to better interact with their surroundings. The sensor is based on a time-of-flight laser ... -
A MULTI-DOMAIN 1D PARTICLE-REACTOR MODEL FOR PACKED BED REACTOR REACTOR APPLICATIONS
(Chapter, 2017)A validated multi-domain 1D particle-reactor model has been developed to simulate packed bed reactor operation. Two main components of the model are: (1) a particle model for simulating the radial distribution of chemical ...